727 lines
39 KiB
JSON
727 lines
39 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20191367",
|
||
"Version": "oval:org.altlinux.errata:def:20191367",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2019-1367: package `arm-none-eabi-binutils` update to version 2.32-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p10"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2019-1367",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1367",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00568",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00568",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00569",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00569",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00572",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00572",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00574",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00574",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00575",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00575",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00576",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00576",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00577",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00577",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00578",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00578",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00579",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00579",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00668",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00668",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00671",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00671",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00672",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00672",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00673",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00673",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00676",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00676",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01241",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01241",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01389",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01389",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-01657",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-01657",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1000876",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10372",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10372",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10373",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10373",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10534",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10534",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-10535",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-10535",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12641",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12697",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12698",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12699",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-12934",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12934",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13033",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13033",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-19931",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19931",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-19932",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-19932",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-20671",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20671",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-6543",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6543",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-6759",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6759",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-6872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7208",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7208",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7568",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7568",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7569",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7569",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7570",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7570",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7642",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7642",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-7643",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-7643",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-8945",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-8945",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-9138",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-9138",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-9996",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-9996",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-1010204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-37322",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-37322",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades arm-none-eabi-binutils to version 2.32-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00568: Уязвимость функции display_debug_ranges программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00569: Уязвимость функции coff_pointerize_aux программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00572: Уязвимость функции load_specific_debug_section программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00574: Уязвимость функции bfd_get_debug_link_info_1 программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00575: Уязвимость функции elf_parse_notes программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00576: Уязвимость функции parse_die программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00577: Уязвимость функции parse_die программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00578: Уязвимость функции assign_file_positions_for_non_load_sections программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00579: Уязвимость функции swap_std_reloc_in программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00668: Уязвимость функций _bfd_XX_bfd_copy_private_bfd_data_common программного средства разработки GNU Binutils, связанная с неограниченным циклом обработки каталога данных, позволяющая нарушителю вызвать запись за пределами буфера\n\n * BDU:2019-00671: Уязвимость программного средства разработки GNU Binutils, связанная с неограниченным рекурсивным выполнением группы функций, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00672: Уязвимость функции ignore_section_sym программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00673: Уязвимость в файле cplus-dem.c программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00676: Уязвимость функции bfd_elf32_swap_phdr_in программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01241: Уязвимость функции load_specific_debug_section в GNU Binutils, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01389: Уязвимость функции finish_stab файла stabs.c набора средств разработки программ Binutils, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-01657: Уязвимость функции disassemble_data() компонента objdump.c программного средства разработки GNU Binutils, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2018-1000876: binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.\n\n * CVE-2018-10372: process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.\n\n * CVE-2018-10373: concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.\n\n * CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.\n\n * CVE-2018-10535: The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a \"SECTION\" type that has a \"0\" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.\n\n * CVE-2018-12641: An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.\n\n * CVE-2018-12697: A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.\n\n * CVE-2018-12698: demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the \"Create an array for saving the template argument values\" XNEWVEC call. This can occur during execution of objdump.\n\n * CVE-2018-12699: finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.\n\n * CVE-2018-12934: remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.\n\n * CVE-2018-13033: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file, as demonstrated by _bfd_elf_parse_attributes in elf-attrs.c and bfd_malloc in libbfd.c. This can occur during execution of nm.\n\n * CVE-2018-19931: An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.\n\n * CVE-2018-19932: An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.\n\n * CVE-2018-20671: load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.\n\n * CVE-2018-6543: In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.\n\n * CVE-2018-6759: The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.\n\n * CVE-2018-6872: The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.\n\n * CVE-2018-7208: In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.\n\n * CVE-2018-7568: The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.\n\n * CVE-2018-7569: dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.\n\n * CVE-2018-7570: The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.\n\n * CVE-2018-7642: The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.\n\n * CVE-2018-7643: The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.\n\n * CVE-2018-8945: The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.\n\n * CVE-2018-9138: An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type.\n\n * CVE-2018-9996: An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.\n\n * CVE-2019-1010204: GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.\n\n * CVE-2021-37322: GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2019-03-07"
|
||
},
|
||
"Updated": {
|
||
"Date": "2019-03-07"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-00568",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00568",
|
||
"Impact": "High",
|
||
"Public": "20180302"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00569",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00569",
|
||
"Impact": "High",
|
||
"Public": "20180217"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00572",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00572",
|
||
"Impact": "High",
|
||
"Public": "20180202"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00574",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00574",
|
||
"Impact": "Low",
|
||
"Public": "20180602"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00575",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00575",
|
||
"Impact": "Low",
|
||
"Public": "20180902"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00576",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00576",
|
||
"Impact": "Low",
|
||
"Public": "20180228"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00577",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-191",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00577",
|
||
"Impact": "Low",
|
||
"Public": "20180228"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00578",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00578",
|
||
"Impact": "Low",
|
||
"Public": "20180228"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00579",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00579",
|
||
"Impact": "Low",
|
||
"Public": "20180302"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00668",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00668",
|
||
"Impact": "Low",
|
||
"Public": "20180429"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00671",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00671",
|
||
"Impact": "Low",
|
||
"Public": "20180302"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00672",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00672",
|
||
"Impact": "Low",
|
||
"Public": "20180429"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00673",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00673",
|
||
"Impact": "Low",
|
||
"Public": "20180302"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-00676",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00676",
|
||
"Impact": "High",
|
||
"Public": "20181207"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01241",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01241",
|
||
"Impact": "Low",
|
||
"Public": "20181127"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01389",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01389",
|
||
"Impact": "Critical",
|
||
"Public": "20180413"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-01657",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-01657",
|
||
"Impact": "High",
|
||
"Public": "20181216"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-1000876",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000876",
|
||
"Impact": "High",
|
||
"Public": "20181220"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10372",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10372",
|
||
"Impact": "Low",
|
||
"Public": "20180425"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10373",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10373",
|
||
"Impact": "Low",
|
||
"Public": "20180425"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10534",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10534",
|
||
"Impact": "Low",
|
||
"Public": "20180429"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-10535",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-10535",
|
||
"Impact": "Low",
|
||
"Public": "20180429"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12641",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-400",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12641",
|
||
"Impact": "Low",
|
||
"Public": "20180622"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12697",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12697",
|
||
"Impact": "High",
|
||
"Public": "20180623"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12698",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12698",
|
||
"Impact": "High",
|
||
"Public": "20180623"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12699",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12699",
|
||
"Impact": "Critical",
|
||
"Public": "20180623"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-12934",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12934",
|
||
"Impact": "High",
|
||
"Public": "20180628"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13033",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-770",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13033",
|
||
"Impact": "Low",
|
||
"Public": "20180701"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-19931",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19931",
|
||
"Impact": "High",
|
||
"Public": "20181207"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-19932",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-19932",
|
||
"Impact": "Low",
|
||
"Public": "20181207"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-20671",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20671",
|
||
"Impact": "Low",
|
||
"Public": "20190104"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-6543",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6543",
|
||
"Impact": "High",
|
||
"Public": "20180202"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-6759",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6759",
|
||
"Impact": "Low",
|
||
"Public": "20180206"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-6872",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6872",
|
||
"Impact": "Low",
|
||
"Public": "20180209"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7208",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7208",
|
||
"Impact": "High",
|
||
"Public": "20180218"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7568",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7568",
|
||
"Impact": "Low",
|
||
"Public": "20180228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7569",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7569",
|
||
"Impact": "Low",
|
||
"Public": "20180228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7570",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7570",
|
||
"Impact": "Low",
|
||
"Public": "20180228"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7642",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7642",
|
||
"Impact": "Low",
|
||
"Public": "20180302"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-7643",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-7643",
|
||
"Impact": "High",
|
||
"Public": "20180302"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-8945",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-8945",
|
||
"Impact": "Low",
|
||
"Public": "20180322"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-9138",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-9138",
|
||
"Impact": "Low",
|
||
"Public": "20180330"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-9996",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-674",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-9996",
|
||
"Impact": "Low",
|
||
"Public": "20180410"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-1010204",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010204",
|
||
"Impact": "Low",
|
||
"Public": "20190723"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-37322",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-37322",
|
||
"Impact": "High",
|
||
"Public": "20211118"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:10",
|
||
"cpe:/o:alt:workstation:10",
|
||
"cpe:/o:alt:server:10",
|
||
"cpe:/o:alt:server-v:10",
|
||
"cpe:/o:alt:education:10",
|
||
"cpe:/o:alt:slinux:10",
|
||
"cpe:/o:alt:starterkit:p10",
|
||
"cpe:/o:alt:kworkstation:10.1",
|
||
"cpe:/o:alt:workstation:10.1",
|
||
"cpe:/o:alt:server:10.1",
|
||
"cpe:/o:alt:server-v:10.1",
|
||
"cpe:/o:alt:education:10.1",
|
||
"cpe:/o:alt:slinux:10.1",
|
||
"cpe:/o:alt:starterkit:10.1",
|
||
"cpe:/o:alt:kworkstation:10.2",
|
||
"cpe:/o:alt:workstation:10.2",
|
||
"cpe:/o:alt:server:10.2",
|
||
"cpe:/o:alt:server-v:10.2",
|
||
"cpe:/o:alt:education:10.2",
|
||
"cpe:/o:alt:slinux:10.2",
|
||
"cpe:/o:alt:starterkit:10.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191367001",
|
||
"Comment": "arm-none-eabi-binutils is earlier than 0:2.32-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |